Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
221 results
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
670 views
2 years ago
Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.
1,368 views
6 years ago
He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...
7,438 views
10 years ago
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
16,230 views
Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...
4,454 views
12 years ago
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,850 views
... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.
4,286 views
The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...
1,540 views
His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...
3,092 views
... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.
7,440 views
To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...
1,817 views
... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.
3,053 views
9 years ago
His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented ...
5,590 views
Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...
6,176 views
Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...
70 views
1 year ago
A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...
303 views
2 weeks ago
... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...
1,436 views
Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...
39,645 views
3 years ago
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,159 views
4 years ago
How Debian handles security vulnerabilities (CVEs) for its packages. Learn how security vulnerabilities are tracked and fixed, ...
646 views
2 months ago